期刊文献+

量子保密通信发展趋势与对策探讨 被引量:8

Study on the Trends and Countermeasures for Quantum Secure Communication
原文传递
导出
摘要 目前,国内外在量子保密通信系统实验和应用研究方面取得了很大进展,虽然人们对量子系统的实用性存在较大的争论,但相关研究已经进入了工程实现的关键时期。量子保密通信在窃听检测、身份识别和在线密钥共享等方面具有得天独厚的优势,必将对保密通信领域产生革命性的影响。论文对量子保密通信的技术现状、技术原理和特色进行了介绍,对量子保密通信发展趋势、应用前景和应对策略等进行了分析和探讨。 Recently, great progress has been achieved worldly in quantum secure communication system experiments and application study. Related research enters into a key period of practical realization, though the hot issue about its practicability is still on. Quantum secure communication, which has unique advantages in eavesdropping checking, identity authentication and keys online distributing, will lead a great revolution in the field of secure communication In this paper, we firstly introduce the statues, basic theory and characteristic of quantum Secure communication. Then, we study on the trends, prospect and countermeasures of quantum secure communication in deep.
出处 《信息安全与通信保密》 2009年第9期48-50,54,共4页 Information Security and Communications Privacy
基金 现代通信国家重点实验室基金资助 编号:No.9140C1101010801
关键词 量子保密通信 量子密钥分发 量子身份识别 quantum Secure communication quantum key distribution quantum authentication
  • 相关文献

参考文献8

  • 1Shor P W. Algorithms for quantum computation,discrete log and factoring[J]. FOCS'35, 1994: 124.
  • 2Grover L K . A fast quantum mechanical algorithm for database search[C]. Proceedings, 28th Annual ACM Symposium on the Theory of Computing, 1996: 212.
  • 3周春源,吴光,陈修亮,李和祥,曾和平.50km光纤中量子保密通信[J].中国科学(G辑),2003,33(6):538-543. 被引量:12
  • 4Elliott C. Building the quantum network[J]. New J. Phys. 2002, 04: 46.
  • 5Dominic Mayers. Unconditional Security in Quantum Cryptography[J]. Journal of the ACM, 2001,48(3): 351-406.
  • 6Shor P W. Preskill, Simple Proof of Security of the BB84 Quantum Key Distribution Protocol [J]. Phys. Rev. Lett., 2000, 85: 441-444.
  • 7陈晖,祝世雄,张文政,朱甫臣.量子通信的安全性分析[J].信息安全与通信保密,2008,30(12):120-121. 被引量:7
  • 8Bosrtom K, Felbinger T. Deterministic secure direct communication using entanglement[J]. Phys. Rev. Lett., 2002, 89 (18).

二级参考文献7

  • 1WU Guang, ZHOU Chunyuan & ZENG Heping Key Laboratory of Optical and Magnetic Resonance Spectroscopy and Department of Physics, East China Normal University, Shanghai 200062, China Correspondence should be addressed to Zeng Heping (e-mail: hpzeng @phy.ecnu.edu.cn).Time-division phase modulated single-photon interference in a Sagnac interferometer[J].Chinese Science Bulletin,2003,48(16):1704-1708. 被引量:4
  • 2[1]Gisin N,Thew R.Quantum Communication[J].Nature phot.,2007,01(03)165.
  • 3[2]Dominic Mayers.Unconditional Security in Quantum Cryptography[J].Journal of the ACM,2001,48(03):351-406.
  • 4[3]Ambainis A,Mosca M,Tapp A.Ronald de Wolf.Private Quantum Channels[J].FOCS 2000:547-553.
  • 5[4]Deng FG,Long GL,Liu XS.Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block[J].Phys.Rev.A,2003,68(04):042317.
  • 6Charles H. Bennett,Fran?ois Bessette,Gilles Brassard,Louis Salvail,John Smolin. Experimental quantum cryptography[J] 1992,Journal of Cryptology(1):3~28
  • 7吴光,周春源,曾和平.Sagnac干涉仪中差分相位调制的单光子干涉[J].科学通报,2003,48(13):1393-1397. 被引量:3

共引文献17

同被引文献54

  • 1王静端.量子通信的发展前景[J].半导体光电,2002,23(1):66-68. 被引量:4
  • 2马晓红,于晋龙,杨恩泽,王林.2.5Gb/s光外调制器及驱动器[J].半导体光电,1999,20(1):34-37. 被引量:2
  • 3叶肇晋,蒋凤仙,杨文奎.LiTaO_3强度调制器在脉冲调制中的稳定性研究[J].复旦学报(自然科学版),2005,44(1):31-34. 被引量:3
  • 4曾贵华,朱甫臣.量子密码系统技术实现与实用化研究进展[J].信息安全与通信保密,2005,27(7):165-168. 被引量:7
  • 5GISIN N, RIBORDY G, TITTEL W, et al. Quantum Cryptography[J]. Rev. Mod. Phys, 2002, 74(01): 145-195.
  • 6BENNETT C H, BRASSARD G. Quantum Cryptography: Public key Distribution and Coin Tossing[C]//Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. [s.l.]: IEEE, 1984: 175-179.
  • 7曾贵华.量子密码学[M].北京:中国科学出版社,2004:70_84.
  • 8BENNETT-C H, BRASSARD G. Quantum Cryptography: Public Key Distribution and Coin Tossing [C]//International Conference on Computers, Systems & Signal Processing. India: Bagalore, 1984: 175-179.
  • 9EKERT A K. Quantum Cryptography Based on Bell's Theorem [J]. Phys. Rev. Lett., 1991, 67: 661-663.
  • 10SHANNON C E.Communication Theory of Secrecy Systems[J].Bell Syst.Tech.J.,1949,28:656-715.

引证文献8

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部